000 04766nam a22005895i 4500
001 978-3-030-36899-9
003 DE-He213
005 20240423125047.0
007 cr nn 008mamaa
008 200102s2020 sz | s |||| 0|eng d
020 _a9783030368999
_9978-3-030-36899-9
024 7 _a10.1007/978-3-030-36899-9
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
072 7 _aUMZ
_2thema
082 0 4 _a005.1
_223
100 1 _aLanger, Arthur M.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aAnalysis and Design of Next-Generation Software Architectures
_h[electronic resource] :
_b5G, IoT, Blockchain, and Quantum Computing /
_cby Arthur M. Langer.
250 _a1st ed. 2020.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2020.
300 _aXXII, 308 p. 162 illus., 18 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _a1. Introduction -- 2. Merging Internal Users and Consumer Requirements -- 3. Reviewing the Object Paradigm -- 4. Distributed Client/Server and Data -- 5. The Impact of 5g Wireless Communication -- 6. The Internet of Things -- 7. Blockchain Analysis and Design.
520 _aThis book provides a detailed “how-to” guide, addressing aspects ranging from analysis and design to the implementation of applications, which need to be integrated within legacy applications and databases. The analysis and design of the next generation of software architectures must address the new requirements to accommodate the Internet of things (IoT), cybersecurity, blockchain networks, cloud, and quantum computer technologies. As 5G wireless increasingly establishes itself over the next few years, moving legacy applications into these new architectures will be critical for companies to compete in a consumer-driven and social media-based economy. Few organizations, however, understand the challenges and complexities of moving from a central database legacy architecture to a ledger and networked environment. The challenge is not limited to just designing new software applications. Indeed, the next generation needs to function more independently on various devices, and on more diverse and wireless-centric networks. Furthermore, databases must be broken down into linked list-based blockchain architectures, which will involve analytic decisions regarding which portions of data and metadata will be processed within the chain, and which ones will be dependent on cloud systems. Finally, the collection of all data throughout these vast networks will need to be aggregated and used for predictive analysis across a variety of competitive business applications in a secured environment. Certainly not an easy task for any analyst/designer! Many organizations will continue to use packaged products and open-source applications. These third-party products will need to be integrated into the new architecture paradigms and have seamless data aggregation capabilities, while maintaining the necessary cyber compliances. The book also clearly defines the roles and responsibilities of the stakeholders involved, including the IT departments, users, executive sponsors, and third-party vendors. The book’s structure also provides a step-by-step method to help ensure a higher rate of success in the context of re-engineering existing applications and databases, as well as selecting third-party products, conversion methods and cybercontrols. It was written for use by a broad audience, including IT developers, software engineers, application vendors, business line managers, and executives.
650 0 _aSoftware engineering.
650 0 _aComputer networks .
650 0 _aCooperating objects (Computer systems).
650 0 _aQuantum computers.
650 0 _aData protection.
650 0 _aProgramming languages (Electronic computers).
650 1 4 _aSoftware Engineering.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aQuantum Computing.
650 2 4 _aData and Information Security.
650 2 4 _aProgramming Language.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030368982
776 0 8 _iPrinted edition:
_z9783030369002
776 0 8 _iPrinted edition:
_z9783030369019
856 4 0 _uhttps://doi.org/10.1007/978-3-030-36899-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c173779
_d173779